TY - JOUR
T1 - Toward application-aware security and reliability
AU - Iyer, Ravishankar K.
AU - Kalbarczyk, Zbigniew
AU - Pattabiraman, Karthik
AU - Healey, William
AU - Hwu, Wenmei W.
AU - Klemperer, Peter
AU - Farivar, Reza
N1 - Funding Information:
We thank our research sponsors: the US National Science Foundation (CCR 99- 02026, ACI 0121658 ITR/AP, ACI CNS-0406351, and NSF CNS 05-24695); Gigascale Systems Research Center (GSRC/MARCO); Motorola; and Intel. Finally, we thank our colleagues, past and present, for their contributions to the research described in this article.
PY - 2007/1
Y1 - 2007/1
N2 - Increasing complexity of computer systems and their deployment in mission- and life-critical applications, are driving the need to provide applications with security and reliability support. Application-aware checking mechanism can effectively provide knowledge about an application's characteristics to the underlying hardware, and can make attack and error checkers smarter to detect only those errors that affect the application. Such hardware-based techniques also have advantage of low overhead because the hardware modules can perform security and reliability checking in parallel with the application's execution. The security checks are indented to defend against potential security attacks by preventing malicious corruption of critical data. Meanwhile, the reliability checks are intended to detect errors in the critical variable's value, which occur due to both transient errors and software errors.
AB - Increasing complexity of computer systems and their deployment in mission- and life-critical applications, are driving the need to provide applications with security and reliability support. Application-aware checking mechanism can effectively provide knowledge about an application's characteristics to the underlying hardware, and can make attack and error checkers smarter to detect only those errors that affect the application. Such hardware-based techniques also have advantage of low overhead because the hardware modules can perform security and reliability checking in parallel with the application's execution. The security checks are indented to defend against potential security attacks by preventing malicious corruption of critical data. Meanwhile, the reliability checks are intended to detect errors in the critical variable's value, which occur due to both transient errors and software errors.
UR - http://www.scopus.com/inward/record.url?scp=33847696576&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847696576&partnerID=8YFLogxK
U2 - 10.1109/MSP.2007.23
DO - 10.1109/MSP.2007.23
M3 - Article
AN - SCOPUS:33847696576
SN - 1540-7993
VL - 5
SP - 57
EP - 62
JO - IEEE Security and Privacy
JF - IEEE Security and Privacy
IS - 1
ER -